摘要:
A method is provided for inhibiting the generation of digital tokens in an open metering system that includes a host processor and a vault. The method includes the steps of generating in the host processor a first digital token request that corresponds to a first destination identifier and a first postage amount; determining in the host processor if one of the first destination identifier and the first postage amount is different than a prior destination identifier and a prior postage mount, respectively, that correspond to an immediately preceding digital token request; sending the first digital token request to the vault when the first destination identifier and the first postage amount are different than the prior destination identifier and the prior postage amount, respectively; and rejecting the first digital token request when the first destination identifier and the first postage amount are the same as the prior destination identifier and the prior postage amount, respectively. The method includes the further steps of notifying a user when the first destination identifier and the first postage amount are the same as the prior destination identifier and the prior postage amount; providing the user with a capability to confirm that the first digital token request is valid; and sending the first digital token request to the vault when the user confirms that the first digital token request is valid.
摘要:
A cost-effective motion control system communication architecture is provided that supports a centralized control node, distributed control nodes, and smart I/O peripheral control nodes. Networks designed using this architecture, which employs a serial bus, may be readily modified or expanded. The architecture supports both real-time highly periodic communications and event-driven peer-to-peer communications.
摘要:
A cost-effective motion control system communication architecture is provided that supports a centralized control node, distributed control nodes, and smart I/O peripheral control nodes. Networks designed using this architecture, which employs a serial bus, may be readily modified or expanded. The architecture supports both real-time highly periodic communications and event-driven peer-to-peer communications.
摘要:
Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.
摘要:
A method for printing secure source images of the type that contain specific critical elements and non-secure images on a single printer includes determining the origin of an image (secure source or non-secure source). If the image to be printed is from the non-secure source, a determination is made if the image contains the specific critical elements of the type contained in secure source images. Printing of the image from the non-secure source is disabled if the image contains specific critical elements of the type contained in secure source images. Printing of the image from a non-secure source is enabled if the image does not contain specific critical elements of the type contained in the secure image. The determination if the non-secure source image contains the specific critical elements of the type contained in secure source images can be made after printing has commenced of the non-secure image.
摘要:
Various methods for detecting the removal of a processing unit, such as a microprocessor or a microcontroller, form a printed circuit board in a secure printing system, such as a postage metering system are provided. The methods utilize one or more of a real time clock provided internal to the processing unit, a CMOS device provided on the printed circuit board external to the processing unit, and CMOS memory internal to the processing unit to detect the removal of the processing unit and therefore an attack.
摘要:
A media content printing method that includes storing encrypted media content data representing media content in a computing device, generating a file of print commands that include the encrypted media content data non-encrypted commands for printing the media content based on the encrypted media content data, and sending the file of print commands to an intermediate device that stores a cryptographic key. The method further includes sending the non-encrypted commands to a printing device, determining if the media content is authorized to be printed, and decrypting the encrypted media content data in the intermediate electronic device that corresponds to the authorized media content to produce decrypted media content data. The decrypted media content data is sent to the printing device for printing the media content based on the non-encrypted commands and the decrypted media content.
摘要:
A printing system is provided that dynamically adjusts the method of printing an image based on the lightness or darkness of the medium upon which the image will be printed. The reflectivity of the medium upon which an image is to be printed is determined, and the way in which the image will be printed is adjusted based on the determined reflectivity of the medium. For lighter colored mediums, on which sufficient contrast will be provided, the image can be printed directly onto the medium. For darker colored mediums, on which the ink used to print the image will not provide enough contrast with respect to the medium to produce a reliably readable image, the method of printing the image is modified to ensure that sufficient contrast is always provided to produce a reliably readable image.
摘要:
Methods and systems for authenticating website users without exposing passwords or other sensitive information to potential theft are provided. When the user's computer connects to a website server all communications are routed through a secure authentication device. When the authentication device identifies the need for user information to be submitted to the website server, the application retrieves the required information from memory and inserts the information into the appropriate location in the website forms. Since the secure connection to the website server is established in the secure boundary of the authentication device, the information is protected from being obtained by any malware that may reside in the user's computer.
摘要:
A printing system for printing both secure value documents and non-secure documents while ensuring that fraudulent copies of secure value documents printed by the printing system can be detected is provided. The printing system determines if the source is a secure or non-secure source. If the source of the image is a secure source, it will print the image, including any graphic security features. If the source is a non-secure source, before printing the image a filter is applied to the image data to remove any graphic security features included in the received image and/or the printing system will not add any graphic security features to the received image to ensure that the printed image will not contain any copy detection graphic security features.